[PLUG] relay testing, and a question about nmap
sendai
sendai at thedustyshelf.com
Sat Apr 20 19:15:22 UTC 2002
Actually you use -O (capital letter o) to see the OS fingerprint. For a
general scan of my own network I use:
nmap -v -v -sT -sU -O -oN logfile 192.168.*.*
This does an uber-verbose(-v -v) TCP connect(-sT) UDP(-sU) OS
fingerprinted(-O) scan of 192.168.*.* and logs it to a normal text
logfile(-oN logfile).
-----Original Message-----
From: plug-admin at lists.pdxlinux.org
[mailto:plug-admin at lists.pdxlinux.org]On Behalf Of Michael Smith
Sent: Saturday, April 20, 2002 10:33 AM
To: plug at lists.pdxlinux.org
Subject: Re: [PLUG] relay testing, and a question about nmap
Hehe... use the -o option to see what operating system you're running.
Galen Seitz wrote:
> Many of you may already be aware of this, but here's a message about how
> you can test your mail server for open relaying.
>
> In a similar vein, what are the best switches to use with nmap when
> scanning your own machines? nmap has many options, but many of them
> seem to be oriented to hiding the scan.
>
> thanks,
> galen
--
"Ask a Soviet engineer to design a pair of shoes and he'll come up with
something
that looks like the boxes that the shoes came in; ask him to make something
that
will massacre Germans, and he turns into Thomas Fucking Edison." --Neal
Stephenson, Cryptonomicon
_______________________________________________
PLUG mailing list
PLUG at lists.pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug
More information about the PLUG
mailing list